Cyber Attack Defenders

Blogs in Blog

Everyone in IT has heard how Software Defined Networking (SDN) will change our world and that now, thanks to VMware and VMware’s NSX SDN solution, the Software Defined Data Center (SDDC) has become a reality.
Of course, once you enter SDDC world, you have a new set of challenges:
Lack of visibility into East-West (VM-to-VM) traffic
Manual,...

Your legacy Cisco ASA firewalls are nearing the end of life (EOL) and so now your boss has tasked you with selecting a new firewall solution. You’ve heard that the Next Generation Firewall (NGFW) is the next big thing when it comes to protecting network perimeters, but you really don’t know a lot about it. Where do you start? What do you...

In today’s connected world, we hear a lot of talk about advanced persistent threats (APTs). In fact, the term “APT” is thrown around so often that many people have forgotten what it means. They just know it is something bad, relates to computers, and may be caused by a nation state. So I think it will be useful to revisit the definition...

For many workers, a laptop is essential for them to be productive when away from the office. They take their laptops on travel. They bring them home in the evenings and on weekends, perhaps to catch up on work or be on call to handle emergencies. A new report by CYREN highlights how attackers are using the habits of remote and mobile workers...

The holidays are upon us. It really is the most wonderful time of the year. I don’t know about you, but I for one love giving gifts, especially to my children and other family members. Nothing is more thrilling than watching their excitement.
I still remember the birthday dinner for my oldest son when he turned 13 years old and got his...

Palo Alto Networks has been working hard to solve agencies’ endpoint problems with Traps™, its new next-generation endpoint product. It’s a good product to look at.
Recently, the Palo Alto Public Sector team hired MeriTalk to survey federal managers and employees and produce a report on endpoint security. The report offers some...

I recently received a USPS-delivered “official business” letter from the US Office of Personnel Management regarding last summer’s cyber security breach at the agency.
The letter began, “As you may know, the Office of Personnel Management (OPM) was the target of a malicious cyber intrusion carried out against the US Government, which...

If you are an IT professional, you undoubtedly have heard of the NIST Cybersecurity Framework. And if you are an IT professional in the federal government, you have probably been in meetings with upper management discussing what the NIST Cybersecurity Framework guidance means for your agency.
The problem that most technical folks have with...

Many IT savvy folks are too careful to get caught by phishing Emails, but most also believe that even if they do get caught, they would never fall for a phishing site. Paying close attention to the details will protect them.
Not so fast.
The cyber-criminal and cyber-espionage groups have gone high tech and are now using Application Delivery...